RESEARCH PAPER
Assessment of the effectiveness of the security features of personal wireless networks
 
More details
Hide details
1
Pomeranian University in Słupsk, Krzysztofa Arciszewskiego 22A, 76-200 Słupsk
2
Naval Missile Unit, Military Unit 4498, 84-313 Siemirowice
CORRESPONDING AUTHOR
Michał Marek Matuśkiewicz   

Naval Missile Unit, Military Unit 4498, 84-313 Siemirowice
Submission date: 2020-05-23
Final revision date: 2020-11-07
Acceptance date: 2020-11-08
Online publication date: 2020-11-26
Publication date: 2020-12-30
 
Security and Defence Quarterly 2020;32(5):71–81
 
KEYWORDS
TOPICS
ABSTRACT
Wireless network communication standards have become very common due to the huge benefits of their application. The use of radio waves to create networks has reduced infrastructure costs and increased the mobility of devices. The advantages of wireless communication (WLAN) also pose a challenge to the security of transmitted data. However, the use of a wireless signal poses certain threats to network security. The aim of the study was to analyse problems related to the security of WLAN 802.11. and assess its resistance to various attack strategies. It was assumed that wireless networks have an insufficient level of security. The assumed assumption is verifiable due to the ability to monitor events in networks. In order to verify the hypothesis, a number of experiments have been carried out in laboratory conditions, concerning the currently used WLAN protections from the IEEE 802.11 family of standards. The electromagnetic waves used for communication are available to the public at a distance of a few / several dozen metres from the communicating devices. It is easy to monitor air traffic using a network card that operates in monitor mode. The communication itself cannot be secured in any way, so data encryption is one way of secure transmission. During the research, the applied security features were successfully broken with the help of publicly available tools. The obtained results are distinguished by a high level of objectivity and reliability in the assessment of applied wireless network security. It was shown that there are still imperfections in the security and it is possible to break the security measures. The consequences of attacks are very serious and lead to a breach of each of the attributes of secure information. Practice has shown that it is impossible to create a wireless network that is fully secure. The findings of the study should be used to develop methods to improve information security, as well as to raise users’ awareness of existing threats. Not all users of wireless networks are aware of how easy some of the commonly used security features are to break.
 
REFERENCES (17)
1.
Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., and Shamshirband, S. (2017) ‘Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications’, Egyptian Informatics Journal, 18(2), pp. 113–122. doi: 10.1016/j.eij.2016.11.001.
 
2.
Ankar, K., Sundaralingam, S., Balinsky, A., and Miller, D. (2005) Cisco. Bezpieczeństwo sieci bezprzewodowych [Cisco. Wireless network security]. Warsaw: Mikom.
 
3.
Bersani, F., Tschofenig, H. (2007) The EAP-PSK protocol: A pre-shared key Extensible Authentication Protocol (EAP) method. Available at: https://tools.ietf.org/html/rf... (Accessed: 8 April 2020).
 
4.
Bing, B. (2012) Broadband Wireless Multimedia Networks. New Jersey: John Wiley & Sons.
 
5.
Buchanan, C. and Ramachandran, V. (2017) Kali Linux Wireless Penetration Testing. Birmingham: Packt Publishing.
 
6.
Comer, D. (2009) Computer Networks and Internets. 5th Edition. New Jersey: Pearson Education.
 
7.
Erickson, J. (2008) Hacking the art of Exploitation. San Francisco: No Starch Press.
 
8.
Ilyas, M. (2005) Handbook of Wireless Local Area Networks Applications, Technology, Security, and Standards. Boca Raton: CRC Press.
 
9.
Kelly, S. and Clancy, T. (2009) Control and Provisioning of Wireless Access Points (CAPWAP) threat analysis for IEEE 802.11 deployments. Available at: https://tools.ietf.org/html/rf... (Accessed: 8 April 2020).
 
10.
Matuśkiewicz, M. (2020) Assessment of information security in ICT networks. Unpublished Master’s Thesis. Pomeranian Academy in Slupsk.
 
11.
Mavrogiannopoulos, N. (2005) On Bluetooth. Security. Available at: https://members.hellug.gr/nmav... (Accessed: 13 April 2020).
 
12.
Pacheco de Carvalho, J. A. R., Veiga, H., Ribeiro Racheco, C. F., and Reis, A. D. (2012) ‘Performance Evaluation of Laboratory Wi-Fi ieee 802.11g wpa Point-to-Point Links Using TCP, UDP and FTP’, Procedia Technology, 5, pp. 302–309. doi: 10.1016/j.protcy.2012.09.033.
 
13.
Seba, A., Nouali-Taboudjemat, N., Badache, N., and Seba, H. (2019) ‘A Review on security challenges of wireless communications in disaster emergency response and crisis management situations’, Journal of Network and Computer Applications 126, pp. 150–161. doi: 10.1016/j.jnca.2018.11.010.
 
14.
Sosinsky, B. (2009) Networking Bible. Indianapolis: Wiley Publishing.
 
15.
Valterry, N. and Nyberg, K. (2003) UMTS Security. New Jersey: John Wiley and Sons Ltd.
 
16.
Vanhoef, M., Ronen, E. (2019). Dragonblood. Analysing WPA3’s Dragonfly Handshake. Available at: https://wpa3.mathyvanhoef.com/ (Accessed: 11 May 2020).
 
17.
Vanhoef, M. and Ronen, E. (2020) Dragonblood: Analyzing the dragonfly handshake of WPA3 and EAP-pwd. Proceedings of the 2020 IEEE Symposium on Security and Privacy-S&P.
 
eISSN:2544-994X
ISSN:2300-8741